Feeds

IETF aims to can spam

Research group aims to fill technical breach

  • alert
  • submit to reddit

Security for virtualized datacentres

The Internet Engineering Task Force (IETF), the influential Net standards body, has set up a research group geared to fighting the spam menace.

Although there's no shortage of tools designed to filter out spam from legitimate email, the industry has yet to come up with a co-ordinated approach.

Enter the Anti-Spam Research Group, formed under the auspices of the IETF's Internet Research Task Force, which is dedicating itself to developing a co-ordinated approach to combat the problem of unsolicited commercial email.

First the Anti-Spam Research Group (ASRG) will try to develop a consistent definition for spam, which is not as easy at it might at first seem. Following on from that the ASRG wants to develop a mechanism whereby users can "express consent or lack of consent for certain communication and have the architecture support those desires".

The group wants to develop a framework with three components: consent expression, consent enforcement and source tracking, as explained in more detail here.

The ASRG is looking to develop a "taxonomy" of the spam problem and put forward proposals for tackling the issue, which it hopes will be easy to deploy on a wide scale. It's too early to say whether protocol changes might be proposed as part of this work.

The ASRG will not look into the legal aspects of fighting spam, except in so far as these issues affect technical approaches to fighting spam. Spam mitigation needs to be carried on many fronts so current research efforts to apply Bayesian analysis in weeding out spam messages from legitimate email and to slow spammers down using tar pits, are complimentary to the work of the ASRG.

The ASRG is to hold its first meeting on the morning of Thursday, March 20 as part of the 56th IETF conference in San Francisco. ®

External Links

Anti-Spam Research Group

Related Stories

Spammers break law with covert tracking
Where the heck is all this spam coming from?
Plaid up in arms as Commons spam filter bans Welsh
Messenger Pop-up Spam makes us sick
Europe bans spam

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.